Jürjens, Jan
Sicherheitszertifizierung für Daten- und Software-Services in Industrie 4.0: Aspekte der Zertifizierung im Industrial Data SpaceAutomation 2016. 2016
Jürjens, Jan
Sicherheitszertifizierung für den Industrial Data Space3. Forschungstag IT-Sicherheit NRW. 2016
Pape, Sebastian; Flake, Julian; Beckmann, Andreas et al.
STAGE - Software Tool for Automatic Grading of Testing Exercises: Case Study PaperLaura Dillon;Willem Visser;Laurie Williams (Hrsg). Proceedings of the 2016 IEEE/ACM 38th IEEE International Conference on Software Engineering ICSE 2016; 14-22 May, 2016; Austin, Texas, USA. New York, NY: ACM Association for Computing Machinery 2016 S. 491 - 500
Pape, Sebastian; Flake, Julian; Beckmann, Andreas et al.
STAGE: a software tool for automatic grading of testing exercises: case study paper.ICSE (Companion Volume). 2016 S. 491 - 500
Ahmadian, Amir Shayan; Jürjens, Jan
Supporting Model-based Privacy Analysis by Exploiting Privacy Level AgreementsSébastien Varrette;Pascal Bouvry;Albert Y. Zomaya (Hrsg). Proceedings of the 8th IEEE International Conference on Cloud Computing Technology and Science CloudCom 2016: 12–15 December 2016; Luxembourg City, Luxembourg. Los Alamitos, CA: IEEE Computer Society 2016 S. 360 - 365
Shayan Ahmadian, Amir; Jürjens, Jan
Supporting Model-Based Privacy Analysis by Exploiting Privacy Level Agreements.CloudCom. 2016 S. 360 - 365
Shayan Ahmadian, Amir; Coerschulte, Fabian; Jürjens, Jan
Supporting the Security Certification and Privacy Level Agreements in the Context of CloudsBoris Shishkov (Hrsg). Business Modeling and Software Design: 5th International Symposium, BMSD 2015, Milan, Italy, July 6–8, 2015, Revised Selected Papers. Gorgan: Gorgan University of Agricultural Sciences and Natural Resources 2016 S. 80 - 95
Jürjens, Jan
The Industrial Data Space: Platform for Digitization in the Manufacturing and Process Industry (Invited Talk)Industrial Technologies 2016. 2016
Wenzel, Sven; Poggenpohl, Daniel; Jürjens, Jan et al.
UMLchange - Specifying Model Changes to Support Security Verification of Potential EvolutionJens Knoop;Uwe Zdun (Hrsg). Software Engineering 2016: Fachtagung des GI-Fachbereichs Softwaretechnik; 23.-26. Februar 2016 Wien, Proceedings. Bonn: Gesellschaft für Informatik 2016 S. 91 - 92
Wenzel, Sven; Poggenpohl, Daniel; Jürjens, Jan et al.
Umlchange - specifying model changes to support security verification of potential evolution.Software Engineering. 2016 S. 91 - 92
Heinrich, Robert; Gärtner, Stefan; Hesse, Tom-Michael et al.
A Platform for Empirical Research on Information System EvolutionMarek Reformat;Haiping Xu;Kehan Gao;Shihong Huang (Hrsg). Proceedings of the 27th International Conference on Software Engineering and Knowledge Engineering SEKE 2015: Technical Program; July 6 – 8, 2015; Wyndham Pittsburgh University Center, Pittsburgh, USA. Pittsburgh: Knowledge Systems Institute 2015 S. 415 - 420
Heinrich, Robert; Gärtner, Stefan; Hesse, Tom-Michael et al.
A Platform for Empirical Research on Information System Evolution.SEKE. 2015 S. 415 - 420
Jürjens, Jan
Beyond One-Shot Security: Keeping Software Secure during Evolution12. Jahrestreffen der GI-FG FFormale Methoden und Software Engineering für Sichere Systeme (FoMSESS). Bremen. 2015
Jürjens, Jan
Big Data mit Compliance: Konzepte für den Umgang mit Compliance beim Einsatz von Big Data in der FinanzbrancheTDWI 2015. 2015
Jürjens, Jan
Der Industrial Data Space: Eine unternehmensübergreifende Plattform für Big-Data-Analysen (eingeladener Vortrag)Zukunftsworkshop Big Data. 2015
Jürjens, Jan
Digitalisierung - Chancen für den Mittelstand (Podiumsdiskussion)2015
Jürjens, Jan
Industrial Data Space: Eine Plattform für Smart Services und Industrial Analytics: Eingeladener Vortrag auf der Mitgliederversammlung des SOA Innovation LabMitgliederversammlung des SOA Innovation Lab. 2015
Stocker, Joachim; Wenzel, Sven; Jürjens, Jan
IT-Risiko-Check: Das Wissen um geschäftskritische IT- RisikenPeter Schartner;Kerstin Lemke-Rust;Markus Ullmann (Hrsg). D-A-CH security 2015: Bestandsaufnahme - Konzepte - Anwendungen - Perspektiven. Frechen: Syssec 2015 S. 279 - 290
Jürjens, Jan; Shayan Ahmadian, Amir
Model-based Security Analysis and Applications to Security Economics: Invited TalkInternational Conference on Model-Driven Engineering and Software Development (MODELSWARD 2015). 2015
Jürjens, Jan; Shayan Ahmadian, Amir
Model-based Security Analysis and Applications to Security Economics.MODELSWARD. 2015 S. 674 - 677
Jürjens, Jan
Modellbasiertes Sicherheits-Testen für Cloud-basierte ProzesseSoftware-QS-Tag 2015. 2015
Jürjens, Jan
Ökonomische Analyse von Sicherheitsmaßnahmen (Eingeladener Vortrag)Arbeitstreffen der Allianz für Sicherheit in der Wirtschaft e.V. 2015
Apfelbeck, Chris; Fritz, Martin; Jürjens, Jan et al.
Preserving Validity of Batch-Job Nets under Change at Run-TimeSheikh Iqbal Ahamed;Carl K. Chang;William Chu;Ivica Crnkovic;Pao-Ann Hsiung;Gang Huang;Jingwei Yang (Hrsg). Proceedings of the 2015 IEEE 39th Annual Computer Software and Applications Conference Workshops COMPSAC 2015: Volume 2; 1–5 July 2015; Taichung, Taiwan. Los Alamitos, CA: IEEE Computer Society 2015 S. 169 - 178
Apfelbeck, Chris; Fritz, Martin; Jürjens, Jan et al.
Preserving Validity of Batch-Job Nets under Change at Run-Time.COMPSAC. 2015 S. 169 - 178
Bürger, Jens; Jürjens, Jan; Wenzel, Sven
Restoring security of evolving software models using graph transformationInternational Journal on Software Tools for Technology Transfer. Bd. 17. H. 3. Berlin: Springer 2015 S. 267 - 289
Bürger, Jens; Jürjens, Jan; Wenzel, Sven
Restoring security of evolving software models using graph transformation.STTT. Bd. 17. H. 3. 2015 S. 267 - 289
Bürger, Jens; Gärtner, Stefan; Ruhroth, Thomas et al.
Restoring Security of Long-Living Systems by Co-evolution.COMPSAC. 2015 S. 153 - 158
Jürjens, Jan
Secure Database DevelopmentEncyclopedia of Database Systems. Springer 2015 S. TBD
Jürjens, Jan
Security Certification in the Presence of Evolution: Models vs. Code (Invited talk)Software Engineering and Formal Methods - SEFM 2014 Collocated Workshops, Revised Selected Papers. 2015 S. XIX - XX (LNCS)
Rahman, Md. Shamimur; Sadi, Muhammad Sheikh; Ahammed, Sakib et al.
Soft Error Tolerance using Horizontal-Vertical- Double-Bit Diagonal parity methodFelix Pasila;Yusak Tanoto;Resmana Lim;Murtiyanto Santoso;Nemuel Daniel Pah (Hrsg). Proceeding of the 2nd International Conference on Electrical Engineering and Infomation Communication Technology iCEEiC 2015: 21 - 23 May 2015; Jahangirnagar University, Savar, Dhaka, Bangladesh. Piscataway, NJ: IEEE Institute of Electrical and Electronics Engineers 2015 S. 1 - 6
Rosado, David G.; Lammari, Nadira; Jürjens, Jan
Special Issue on Secure Information Systems EngineeringThe Computer Journal. Bd. 58. H. 10. Oxford: Oxford University Press 2015 S. 2193 - 2194
G. Rosado, David; Lammari, Nadira; Jürjens, Jan
Special Issue on Secure Information Systems Engineering.Comput. J. Bd. 58. H. 10. 2015 S. 2193 - 2194
Shayan Ahmadian, Amir; Coerschulte, Fabian; Jürjens, Jan
Supporting the Security Certification and Privacy Level Agreements in the Context of Clouds.BMSD. 2015 S. 80 - 95
Shayan Ahmadian, Amir; Coerschulte, Fabian; Jürjens, Jan
Supporting the Security Certification of Cloud-Computing- Infrastructures: Invited PaperFifth International Symposium on Business Modeling and Software Design (BMSD 2015). 2015 S. 1 - 10
Heinrich, Robert; Gärtner, Stefan; Hesse, Tom-Michael et al.
The CoCoME Platform: A Research Note on Empirical Studies in Information System Evolution.International Journal of Software Engineering and Knowledge Engineering. Bd. 25. H. 9-10. 2015 S. 1715 - 1720
Gärtner, Stefan; Ruhroth, Thomas; Bürger, Jens et al.
Towards Maintaining Long-Living Information Systems by Incorporating Security KnowledgeUwe Aßmann;Birgit Demuth;Thorsten Spitta;Georg Püschel;Ronny Kaiser (Hrsg). Software Engineering & Management 2015 - Multikonferenz der GI-Fachbereiche Softwaretechnik (SWT) und Wirtschaftsinformatik (WI), FA WI-MAW, 17. März - 20. März 2015 in Dresden. Bonn: Gesellschaft für Informatik 2015 S. 83 - 84 (Lecture Notes in Informatics)
Gärtner, Stefan; Ruhroth, Thomas; Bürger, Jens et al.
Towards Maintaining Long-Living Information Systems by Incorporating Security Knowledge.Software Engineering & Management. 2015 S. 83 - 84
Jürjens, Jan
Towards Security of Adaptable Information Systems - Current Views and Future Perspectives: Invited Panel ParticipationFifth International Symposium on Business Modeling and Software Design (BMSD 2015). 2015 S. 1 - 3
Jürjens, Jan
Transparenz und Sicherheit in der LieferketteArbeitstreffen des Bundesverband Deutscher Postdienstleister. 2015
Jürjens, Jan; Wenzel, Sven
Werkzeug für Wirtschaftlichkeit und Effektivität zum Erstellen von SicherheitskonzeptenWIK : Zeitschrift für die Sicherheit der Wirtschaft. Bd. 5. Ingelheim: SecuMedia 2015 S. keine Angaben
Jürjens, Jan; B. Fernández, Eduardo; B. France, Robert et al.
Critical Systems Development Using Modeling Languages. (CSDUML-04): Current Developments and Future Challenges (Report on the Third International Workshop).CoRR. Bd. abs/1409.6608. 2014
Jürjens, Jan; Piessens, Frank; Bielova, Nataliia
Engineering Secure Software and Systems: 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014, ProceedingsGorgan: Gorgan University of Agricultural Sciences and Natural Resources 2014 (LNCS)
Felderer, Michael; Katt, Basel; Kalb, Philipp et al.
Evolution of Security Engineering Artifacts: A State of the Art SurveyInternational Journal of Secure Software Engineering. Bd. 5. H. 4. Hershey, PA: IGI Global 2014 S. 48 - 98
Felderer, Michael; Katt, Basel; Kalb, Philipp et al.
Evolution of Security Engineering Artifacts: A State of the Art Survey.IJSSE. Bd. 5. H. 4. 2014 S. 48 - 98
Jürjens, Jan
Geschäftsprozesse in der Cloud -- aber sicher! (... und compliant)Software Engineering + Architecture (SEACON 2014). 2014 S. 1 - 83
Dupressoir, François; Gordon, Andrew D.; Jürjens, Jan et al.
Guiding a general-purpose C verifier to prove cryptographic protocolsJournal of Computer Security. Bd. 22. H. 5. Amsterdam: IOS Press 2014 S. 823 - 866
Dupressoir, François; D. Gordon, Andrew; Jürjens, Jan et al.
Guiding a general-purpose C verifier to prove cryptographic protocols.Journal of Computer Security. Bd. 22. H. 5. 2014 S. 823 - 866
Gärtner, Stefan; Ruhroth, Thomas; Bürger, Jens et al.
Maintaining Requirements for Long-Living Software Systems by Incorporating Security KnowledgeTony Gorschek;Robyn Lutz (Hrsg). Proceeding of the 2014 IEEE 22nd International Requirements Engineering Conference RE: August 25-29, 2014; Karlskrona, Sweden. Piscataway, NJ: IEEE Institute of Electrical and Electronics Engineers 2014 S. 103 - 112